A dataset of various malicious cryptocurrency-related URLs and Twitter profiles
ā57Apr 29, 2023Updated 2 years ago
Alternatives and similar repositories for blacklist
Users that are interested in blacklist are comparing it to the libraries listed below
Sorting:
- Keeping track of all current cryptocurrency scams in an open-source databaseā21Dec 17, 2020Updated 5 years ago
- š GitHub list will be disabled from May 1, 2025 ā Use lookup.phishfort.com instead.ā108Mar 1, 2026Updated 2 weeks ago
- A list of bitcoin addresses being used in Ransomware and Sextortion Scamsā17Jul 4, 2021Updated 4 years ago
- Attacker Contract Identifier Through Static Dataflow Analysisā26Oct 15, 2025Updated 5 months ago
- This repository contains the RAW results of the vulnerability analysis of 9 tools on 47,587 smart contracts. These results are presented ā¦ā80Jul 24, 2020Updated 5 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPsā21Sep 1, 2025Updated 6 months ago
- A UserScript to detect GPT generated comments on Hackernews.ā13Dec 10, 2022Updated 3 years ago
- Metadata portal for Parity Signerā35Updated this week
- Simple, fast dictionary-based language detector for short texts.ā20Feb 5, 2026Updated last month
- Napkin is a simple tool to produce statistical analysis of a textā12Feb 25, 2024Updated 2 years ago
- repo for sharing stuffā17Jul 1, 2025Updated 8 months ago
- š¤ Sign & send Ethereum transactionsā14Sep 12, 2021Updated 4 years ago
- Packet Construction Setā10Nov 20, 2017Updated 8 years ago
- A collection of tiny utilities for node streamsā13Jan 29, 2025Updated last year
- Chrome extension for zero-hour phishing protectionā18Apr 12, 2021Updated 4 years ago
- A small dependency-free library for interfacing with a Ledger over the Web Authentication API.ā10Jan 9, 2023Updated 3 years ago
- Maltego transforms for Hunchlyā17Jun 9, 2025Updated 9 months ago
- Blockchain graph analysis tools for Bitcoin. In collaboration w. Aurora Guo.ā27Nov 29, 2016Updated 9 years ago
- Proactive malware campaign discovery systemā21Jul 29, 2022Updated 3 years ago
- Yet another way to find where to report an abuseā31Jan 25, 2025Updated last year
- Tensorflow Phishing Domains Exampleā23Jun 28, 2018Updated 7 years ago
- Automated scripts to support converting filter lists (in various formats) to "domain-only" lists for use in DNS / domain-blocking tools lā¦ā23May 22, 2023Updated 2 years ago
- External twitter feeder for AIL frameworkā16Apr 16, 2023Updated 2 years ago
- A Python library for parsing the Abstract Syntax Tree (AST) of compiled Solidity files.ā11Dec 1, 2023Updated 2 years ago
- A benchmark suite (under construction) for smart contract vulnerability toolsā17Jul 13, 2021Updated 4 years ago
- React components for https://explore.ipld.io and ipfs-webuiā26Mar 1, 2026Updated 2 weeks ago
- History and analysis of Windows desktop imagesā19Jan 28, 2021Updated 5 years ago
- code for "Learning to Represent Programs with Heterogeneous Graphs"ā12May 17, 2022Updated 3 years ago
- CocktailParty is a data broker system based on phoenix frameworkā23Apr 23, 2025Updated 10 months ago
- N-API based Souvenir service for CascadiaJS 2018ā14Dec 15, 2018Updated 7 years ago
- Yet Another Memory Analyzer for malware detectionā24Aug 4, 2023Updated 2 years ago
- Every click in Telegram matters! Turn your footprints into rewards with PAWS! š¾ā10Nov 6, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feedsā33Feb 6, 2024Updated 2 years ago
- ā16Jun 21, 2024Updated last year
- Set of text- and file-oriented utilities for processing texts, files and pipingā11Oct 16, 2024Updated last year
- rust wrappers for kernel mode synchronization primitivesā16Feb 14, 2026Updated last month
- JSON API for ExploitDB Websiteā17Jan 11, 2015Updated 11 years ago
- CyCAT.org API back-end server including crawlersā29Feb 4, 2023Updated 3 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidityā13Nov 2, 2018Updated 7 years ago